Discover how cryptography can be used to provide confidentiality and integrity for data at rest and data in transit. Explore hashing, symmetric and asymmetric encryption, digital signatures, and secure protocols.
Learning Objectives
System Security Certified Practitioner (SSCP 2018): Cryptography Primer
- Course Overview
- explain how cryptography can protect IT solutions and how the implementation is often influenced by regulations
- describe how hashing relates to integrity using algorithms such as HMAC
- generate a hash for a file to ensure it is authentic and has not been corrupted
- describe how key lengths relate to cryptographic strength
- explain how symmetric encryption uses a single key to protect data
- explain how asymmetric encryption uses related keys to protect data
- describe ECC cryptography
- provide examples of how malicious users can attack cryptographic implementations
- describe how unique digital signatures provide message authenticity
- explain when to use SSL/TLS, S/MIME, IPSec, and DKIM
- configure IPSec in a Windows environment
- demonstrate why Telnet remote administration should never be used
- determine which cryptographic solutions best meets security needs